Sciweavers

817 search results - page 47 / 164
» Malware behaviour analysis
Sort
View
SAS
2000
Springer
15 years 3 months ago
Enforcing Design Constraints with Object Logic
Design constraints express essential behavioural properties of a software system. Two key elements of a scheme for enforcing design constraints are presented: a logic for describin...
Daniel Jackson
ICDM
2008
IEEE
127views Data Mining» more  ICDM 2008»
15 years 6 months ago
The Impact of Structural Changes on Predictions of Diffusion in Networks
In a typical realistic scenario, there exist some past data about the structure of the network which are analyzed with respect to some possibly future spreading process, such as b...
Mayank Lahiri, Arun S. Maiya, Rajmonda Sulo, Habib...
EPEW
2008
Springer
15 years 1 months ago
A Ticking Clock: Performance Analysis of a Circadian Rhythm with Stochastic Process Algebra
We apply performance analysis techniques to a biological modelling problem, that of capturing and reproducing the Circadian rhythm. A Circadian rhythm provides cells with a clock b...
Jeremy T. Bradley
INTERSPEECH
2010
14 years 6 months ago
Identifying articulatory goals from kinematic data using principal differential analysis
Articulatory goals can be highly indicative of lexical intentions, but are rarely used in speech classification tasks. In this paper we show that principal differential analysis c...
Michael Reimer, Frank Rudzicz
FGR
2011
IEEE
244views Biometrics» more  FGR 2011»
14 years 3 months ago
Emotion representation, analysis and synthesis in continuous space: A survey
— Despite major advances within the affective computing research field, modelling, analysing, interpreting and responding to naturalistic human affective behaviour still remains...
Hatice Gunes, Björn Schuller, Maja Pantic, Ro...